Setting Up Enterprise Manager to Administer Recovery Appliance
To enable Enterprise Manager to administer Recovery Appliance, you must deploy the management agents to each compute server, then discover the targets for the Recovery Appliance. The targets include the cluster, database, listeners, Automatic Storage Management (ASM), and the appliance itself.
Work with your Oracle support engineer to perform the tasks in this section.
Note:
See Doc ID 1929507.1 for information about the plug-ins and patches required for Zero Data Loss Recovery Appliance management, monitoring, and protected database management.
Deploying the Enterprise Manager Agents
If your Recovery Appliance is in compliance mode, you must enable SSH access using racli enable ssh
before you can deploy the Enterprise Manager Agents. The process for enabling SSH access requires quorum approval. After the agents have been deployed on all the compute servers, disable SSH access with racli disable ssh
.
Perform the following steps to deploy a management agent to each Recovery Appliance compute server:
Discovering the Cluster
Perform the following steps to discover the Recovery Appliance cluster.
Note:
If the Recovery Appliance is TLS-enabled, make sure the TCPS port and protocol are specified during the discovery of the cluster, the Recovery Appliance database, and the Recovery Appliance target.
Discovering the Cluster Database Targets
Before you discover the Recovery Appliance itself, perform the following steps to discover the Recovery Appliance cluster database, listener, and ASM targets.
Note:
If the Recovery Appliance is TLS-enabled, make sure the TCPS port and protocol are specified during the discovery of the cluster, the Recovery Appliance database, and the Recovery Appliance target.
Discovering the Recovery Appliance
After discovering the Recovery Appliance cluster and cluster database targets, the Recovery Appliance target itself can be discovered. As part of discovering the top-level Recovery Appliance target that will include all Enterprise Manager Recovery Appliance software and hardware management functionality, a separate Recovery Appliance hardware target will also be discovered.
Perform the following steps to manually discover the Recovery Appliance target. These steps apply to Recovery Appliance not in TLS mode.
Monitoring TLS-enabled Targets
Enterprise Manager (EM or Cloud Control) can monitor targets that use TCPS.
A wallet needs to be setup at the EM repository. This wallet should contain the certificates needed to connect to the TLS-enabled target. In addition, OMS wallet specific properties have to be set. EM has one wallet, and this wallet is used by EM to communicate with any TLS-enabled target.
Note:
EM agents that monitor TLS-enabled targets also need to have wallets created with the necessary certificates and agent properties. Refer to Monitoring TLS-enabled Targets with EM AgentsMonitoring TLS-enabled Targets with EM Agents
Enterprise Manager (EM or Cloud Control) Agents can monitor targets that use TCPS.
A wallet needs to be setup at the EM repository. This wallet should contain the certificates needed to connect to the TLS-enabled target. In addition, Agent specific wallet properties have to be set.
Discovering TLS-Enabled Recovery Appliance
Enterprise Manager (Cloud Control) requires a few extra steps to discover TLS-enabled Recovery Appliances and TLS-enabled databases.
-
The Recovery Appliance should be configured to use TCPS (TLS). Refer to TLS Overview.
-
The EM wallet or the EM Agent wallet needs to be updated, or created if it didn't already exist.
-
Refer to: Monitoring TLS-enabled Targets
-
Discovering a Recovery Appliance using TLS requires that the TCPS port and protocol be specified when discovering the cluster, the Recovery Appliance database, and the Recovery Appliance target.
The ZDLRA discovery wizard has an option to upload the Recovery Appliance certificate to EM. The certificate is saved in EM and used when protected databases are configured to backup to this Recovery Appliance. Certificates not added during discovery can also be added after discovery with Recovery Appliance->Target Setup->TLS Trust Certificate..
Migrating TCP to TCPS Recovery Appliance
If the Recovery Appliance was already discovered in EM using TCP:
-
Create the EM wallet on both the OMS and the agent. Add the Recovery Appliance certificate(s) to the wallet. Set the EM properties.
-
Edit the port/protocol properties for the cluster and cluster database target associated with the Recovery Appliance.
-
Edit the port/protocol properties for the Recovery Appliance target itself. Upload the Recovery Appliance certificates to EM. They are used when protected databases are configured.
From theCluster Target home page in EM, select Cluster->Target Setup->Monitoring Configuration
-
Update Scan Port to be the TCPS port.
-
From the Cluster Database home page in EM, select Cluster Database->Target Setup->Monitoring Configuration
-
In the Instances section, edit each instance and update the Port and Connection Protocol.
-
From the Recovery Appliance home page in EM, select Recovery Appliance->Target Setup->Monitoring Configuration
-
Update all ports and protocols, including ones for the backup scan and replication scans (if needed).
Discovery and Monitoring of Database Targets using TLS
-
Discover the database in EM, making sure to specify the TCPS port and protocol.
Refer to Discovering and Adding Database Targets.
-
If this is a cluster database, specify the TCPS port for the underlying Cluster SCAN port.
-
While discovering the Cluster database, change the port for the individual database instances to be TCPS ports.
-
If the database has already been discovered in EM using TCP, migrate this to use TCPS.
-
Ensure that the OMS and Agent wallets have been configured as above.
-
Ensure that OMS wallet and agent wallet(s) have the DB certificate.
-
Change the monitoring configuration for the database. Note that if this is a cluster database, you should change the SCAN port for the underlying cluster and set the TCPS port for all the instances of the cluster database.
-
Configuring the protected database to backup to the TLS-enabled Recovery Appliance
Prerequisites:
-
Add the database to the Recovery Appliance using the Recovery Appliance->Protected Databases page.
-
Add the Recovery Appliance certificate to EM using the Recovery Appliance->Target Setup->TLS Trusted Certificate menu item
-
Go to the Database home page in EM. Navigate to the Database->Availability->Backup and Recovery->Configure Backup page.
-
Select Recovery Appliance as the destination and specify the database host credentials.
-
Select the Recovery Appliance, VPC user and Protocol to use. The Protocol field offers the choice of TCP and TCPS protocols ONLY if the Recovery Appliance is in dual mode.
The Configure Backup workflow detects if the database already has an existing wallet and populate the location of the wallet if one is found.
If the wallet is a password-protected wallet, specify the generic password credential needed to open the wallet. A generic password credential can only be created using emcli today.
$ emcli create_named_credential -auth_target_type='<system>' -cred_type=GenericPassword -cred_name="<credName>" -attributes="GENERIC_PASSWORD:<walletPassword>"
Run this command as-is with the exception of these two variables.-
credName is the name of the generic named credential you are creating.
-
walletPassword is the password for the database wallet.
-
-
Select other options as desired and then click Submit.
A deployment procedure is submitted to configure the database. A link to this procedure is displayed in the confirmation box.
You can also navigate to the Enterprise->Provisioning and Patching->Procedure Activity menu item to see the deployment procedure execution details.
-
If the database has already been configured to backup to a Recovery Appliance, the Configure Backup page appears when you go to Availability->Backup and Recovery->Configure Backup.
Provide the host credential and then invoke the Change Configuration action in the Actions menu on the right-hand corner to:
-
Change the Recovery Appliance details, or
-
Change any of the backup options (protocol, enable/disable real time redo, parallelism).
-
Scheduling Backups from the Datase to the Recovery Appliance
After successful configuration of backups, go to the Availability->Backup and Recovery->Schedule Backup menu item from the database home page.
On the Schedule Backup page, specify the host credentials for the database host and select how often you'd like the backups to be sent. The suggested backup strategy for backups to the Recovery Appliance is to send incremental backups daily.